cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
☆1,241Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.☆552Updated this week
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,094Updated 11 months ago
- 📚 A curated list of awesome Docker security resources☆678Updated 3 weeks ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,045Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,123Updated 8 months ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,568Updated 2 years ago
- Checklist for container security - devsecops practices☆1,575Updated last year
- My cheatsheet notes to pentest AWS infrastructure☆679Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,131Updated 3 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,330Updated 4 months ago
- ☆570Updated 2 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆998Updated last year
- Automated Red Team Infrastructure deployement using Docker☆1,248Updated 2 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆400Updated 6 months ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆488Updated 2 years ago
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,265Updated 5 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,390Updated last year
- Dangerously fast DNS/network/port scanner☆906Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,049Updated last month
- NMAP Vulnerability Scanning Scripts☆629Updated 3 years ago
- A curated list of awesome CI CD security resources☆547Updated 7 months ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆848Updated 2 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆890Updated 2 years ago
- Reverse proxies cheatsheet☆1,822Updated last year
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,118Updated last week
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,182Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,445Updated 2 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,333Updated last month
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,025Updated 2 weeks ago
- Awesome cloud enumerator☆1,018Updated 3 months ago